- π Just graduated Plus Two β currently on vacation and diving deep into ethical hacking
- π§ Self-learning cybersecurity, phishing techniques, and hacking tools every single day
- π‘οΈ Practicing on platforms like TryHackMe to sharpen both my mindset and skills
- π― Dream goal: Become a cybersecurity expert protecting the world from cyber threats
- π± Hacking on the go using Termux on my Android device, and my main setup is Kali Linux for penetration testing, vulnerability analysis, and network security assessments.
- π Soon to earn my Ethical Hacking Certificate and continue my studies in the field
- π§ Penetration Testing: Using Kali Linux tools to find vulnerabilities and exploit weaknesses in systems.
- π Reconnaissance: Gathering intelligence using tools like Nmap, Netcat, Recon-ng, and WhatWeb.
- π οΈ Exploit Development: Writing and using exploits with Metasploit and Social Engineering Toolkit (SET).
- π Web Application Testing: Leveraging Burp Suite, Nikto, and OWASP ZAP for scanning and exploiting web apps.
- π§ Network Security: Analyzing traffic with Wireshark and tcpdump, performing MITM attacks, and securing networks.
- π Password Cracking: Cracking passwords using John the Ripper, Hashcat, and Hydra.
- Certificate in Threats and Cyber Attacks (Class 9th, 2022): Earned a certificate in identifying and defending against cyber threats, cyber attacks, and security measures during my early years in ethical hacking.
- Kali OS Certificate (HackerX): Completed a certificate focusing on the installation, configuration, and advanced usage of Kali Linux for penetration testing and cybersecurity tasks.
- Completed TryHackMe Learning Paths: Successfully finished several ethical hacking challenges, covering areas like web application attacks, network security, and penetration testing.
- Kali Linux Mastery: Set up and customized my own Kali Linux environment for penetration testing, including running buffer overflow exploits, SQL injection, and network traffic analysis.
- Metasploit & Wireshark Experience: Gained hands-on experience using Metasploit for exploiting vulnerabilities and Wireshark for network traffic analysis and attack simulations.
- Social Engineering Campaigns: Practiced phishing and social engineering techniques with the Social Engineering Toolkit (SET) to increase awareness and simulate attacks.
- π§ Email: cybermalik01010@gmail.com
- π LinkedIn: Muhammed Muhsin M S
- πΌ GitHub: Muhsin M S
DREAM never let you sleep ποΈπ¨
Youβre chilling. Iβm chilling and hacking. π

